Siemens Mitigates SICAM Holes

Thursday, November 16, 2017 @ 02:11 PM gHale


Siemens has a plan to mitigate missing authentication for critical function, cross-site scripting and code injection vulnerabilities for its SICAM product, according to a report with ICS-CERT.

SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, DNPi00: All versions suffer from the remotely exploitable vulnerabilities, discovered by the SEC Consult Vulnerability Lab.

RELATED STORIES
Moxa Releases New NPort Firmware
Siemens’ Mitigation Plan for KRACK Holes
ABB Working on Fix for TropOS
Philips Clears Hole in Medical Systems

Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code.

Attackers would need a low skill level to leverage the vulnerabilities. Active exploits are available.

In one vulnerability, the integrated web server (Port 80/TCP) of the affected devices could allow unauthenticated remote attackers to obtain sensitive device information over the network.

CVE-2017-12737 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.

In addition, the integrated web server (Port 80/TCP) of the affected devices could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into clicking on a malicious link.

CVE-2017-12738 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.1.

Also, the integrated web server (Port 80/TCP) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.

CVE-2017-12739 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product mainly sees use in the energy sector. It also sees action on a global basis.

As the web server is for diagnostics only and not required for normal operation, Siemens recommends disabling the web server after commissioning.

For users who are currently using the discontinued ETA2 (IEC 60870-5-104), MODi00 (Modbus/TCP slave) or DNPi00 (DNP3/TCP slave) firmware, Siemens recommends users upgrade to ETA4 (IEC 60870-5-104), MBSiA0 (Modbus/TCP slave) or DNPiA1 (DNP3/ TCP slave) firmware, respectively, on the SM-2558 COM Module, which is the successor to the SM-2556 Module. Click here to view the upgrades.

Siemens recommends users protect network access with appropriate mechanisms. Siemens also advises users to configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security.

For more information on these vulnerabilities and more detailed mitigation instructions, see the Siemens Security Advisory SSA-164516.



Leave a Reply

You must be logged in to post a comment.